COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following are true about reverse proxy? (Select two.)
A
Handles requests from the internet to a server in a private network.
B
Clients always know they are using reverse proxy.
C
Handles requests from inside a private network out to the internet.
D
Sits between a client computer and the internet.
E
Can perform load balancing, authentication, and caching.
Explanation: 

Detailed explanation-1: -reverse proxies can perform load balancing, authentication, and caching.

Detailed explanation-2: -Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests.

Detailed explanation-3: -A reverse proxy server handles requests from the internet to a server located inside a private network. A reverse proxy can perform load balancing, authentication, and caching.

Detailed explanation-4: -UTM devices are hardware or software that tie together network security features into one simple-to-use, easy-to-manage appliance. In addition to having a firewall, VPN and IPS, every UTM appliance supports network-or cloud-based centralized management.

There is 1 question to complete.